[Pkg-shadow-devel] Bug#89902: marked as done ([FIXED 4.0.13] login: faillog message is misleading and loses information)

Debian Bug Tracking System owner at bugs.debian.org
Thu Oct 13 18:48:50 UTC 2005


Your message dated Thu, 13 Oct 2005 11:32:08 -0700
with message-id <E1EQ7s8-0001Xh-00 at spohr.debian.org>
and subject line Bug#89902: fixed in shadow 1:4.0.13-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 16 Mar 2001 16:25:24 +0000
>From jeffsh at erols.com Fri Mar 16 10:25:24 2001
Return-path: <jeffsh at erols.com>
Received: from 209-122-228-54.s989.apx1.nyw.ny.dialup.rcn.com (eden-hda7.my.local) [209.122.228.54] (postfix)
	by master.debian.org with esmtp (Exim 3.12 1 (Debian))
	id 14dx2Y-0001S8-00; Fri, 16 Mar 2001 10:25:23 -0600
Received: by eden-hda7.my.local (Postfix, from userid 1001)
	id 6B72B15D38; Fri, 16 Mar 2001 11:24:34 -0500 (EST)
From: Jeff Sheinberg <jeffsh at erols.com>
Subject: login: faillog message is misleading and loses information
To: submit at bugs.debian.org
X-Mailer: bug 3.3.9
Message-Id: <20010316162434.6B72B15D38 at eden-hda7.my.local>
Date: Fri, 16 Mar 2001 11:24:34 -0500 (EST)
Delivered-To: submit at bugs.debian.org

Package: login
Version: 20000902-2
Severity: normal

Hi,

By trying to produce a consise faillog message, login ends up
being confusing at best, and actually loses information when the
last login failure occurred more than 6 days ago.

In the former case, login assumes that the just logged in user is
mentally aware of the current day of week, current day of month,
and current time.  Therefore, in the case of the last failure
having occurred, eg, 2 hours ago, login prints only the time of
the last failure, omitting the day of week.  Likewise, if the
failure occurred 2 days ago, login prints the day of week and
the time.

In the latter case, if the failure occurred more than 6 day ago,
login prints only the day of week and time, omitting the day of
month.  In this case the faillog message is ambiguous, as the
following typescript shows,

    106 jeff ~ $ faillog -u luser
    Username   Failures  Maximum  Latest
    luser             1        0  Wed Mar  7 15:27:53 -0500 2001 on
    pts/2

    107 jeff ~ $ cal
         March 2001
    Su Mo Tu We Th Fr Sa
                 1  2  3
     4  5  6  7  8  9 10
    11 12 13 14 15 16 17
    18 19 20 21 22 23 24
    25 26 27 28 29 30 31

    108 jeff ~ $ date
    Fri Mar 16 10:59:29 EST 2001

    100 jeff ~ $ elo luser
             --> exec login luser
    Password: 
    Last login: Wed Mar  7 15:27:25 2001 on pts/2
    Linux eden-hda7.my.local 2.2.18 #2 Wed Feb 7 08:10:35 EST 2001
    i586 unknown
    For exact distribution terms see the
    `/usr/share/doc/*/copyright/*' files.
    Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
    permitted by applicable law.
    1 failure since last login.  Last was Wednesday 15:27:53 on pts/2.
    0=-bash, 1=/etc/profile, EUID=1003, PWD=~luser, SHELL=/bin/bash, SHLVL=1
    bash-2.04$ 

so, in this case, did the failure occur on Wed, March 14 2001 or
Wed March 7 2001?

I would suggest that login should always print the failure message
like so,

     1 failure since last login.
     Last failure was Wed Mar  7 15:27:53 2001 on pts/2.

Thanks,
-- 
Jeff Sheinberg  <jeffsh at erols.com>


-- System Information
Debian Release: woody/testing
Kernel Version: Linux eden-hda7.my.local 2.2.18 #2 Wed Feb 7 08:10:35 EST 2001 i586 unknown

Versions of the packages login depends on:
ii  libc6          2.2.2-1        GNU C Library: Shared libraries and Timezone
ii  libpam-modules 0.72-9         Pluggable Authentication Modules for PAM
ii  libpam0g       0.72-9         Pluggable Authentication Modules library

--- Begin /etc/login.defs (modified conffile)
MAIL_DIR        /var/mail
FAIL_DELAY		3
FAILLOG_ENAB		yes
LOG_UNKFAIL_ENAB	no
LOG_OK_LOGINS		yes
QUOTAS_ENAB		yes
SYSLOG_SU_ENAB		yes
SYSLOG_SG_ENAB		yes
SULOG_FILE	/var/log/sulog
FTMP_FILE	/var/log/btmp
SU_NAME		su
HUSHLOGIN_FILE	.hushlogin
NOLOGIN_STR	NOLOGIN
ENV_HZ		HZ=100
ENV_SUPATH	PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/bin/X11:/usr/local/sbin:/usr/local/bin
ENV_PATH	PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/bin/X11:/usr/games:~/bin:~
TTYGROUP	tty
TTYPERM		0600
ERASECHAR	0177
KILLCHAR	025
UMASK		022
PASS_MAX_DAYS	99999
PASS_MIN_DAYS	0
PASS_WARN_AGE	7
UID_MIN			 1000
UID_MAX			60000
GID_MIN			  100
GID_MAX			60000
LOGIN_RETRIES		5
LOGIN_TIMEOUT		60
PASS_MAX_LEN		8
CHFN_AUTH		yes
CHFN_RESTRICT		rwh
DEFAULT_HOME	yes
USERGROUPS_ENAB yes
CLOSE_SESSIONS no

--- End /etc/login.defs

--- Begin /etc/securetty (modified conffile)
pts/0
pts/1
pts/2
tty1
tty2
tty3
tty4
tty5
tty6
tty7
tty8
tty9
tty10
tty11
tty12
vc/1
vc/2
vc/3
vc/4
vc/5
vc/6
vc/7
vc/8
vc/9
vc/10
vc/11
vc/12

--- End /etc/securetty

---------------------------------------
Received: (at 89902-close) by bugs.debian.org; 13 Oct 2005 18:40:21 +0000
>From katie at spohr.debian.org Thu Oct 13 11:40:21 2005
Return-path: <katie at spohr.debian.org>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
	id 1EQ7s8-0001Xh-00; Thu, 13 Oct 2005 11:32:08 -0700
From: Christian Perrier <bubulle at debian.org>
To: 89902-close at bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#89902: fixed in shadow 1:4.0.13-1
Message-Id: <E1EQ7s8-0001Xh-00 at spohr.debian.org>
Sender: Archive Administrator <katie at spohr.debian.org>
Date: Thu, 13 Oct 2005 11:32:08 -0700
Delivered-To: 89902-close at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 20

Source: shadow
Source-Version: 1:4.0.13-1

We believe that the bug you reported is fixed in the latest version of
shadow, which is due to be installed in the Debian FTP archive:

login_4.0.13-1_i386.deb
  to pool/main/s/shadow/login_4.0.13-1_i386.deb
passwd_4.0.13-1_i386.deb
  to pool/main/s/shadow/passwd_4.0.13-1_i386.deb
shadow_4.0.13-1.diff.gz
  to pool/main/s/shadow/shadow_4.0.13-1.diff.gz
shadow_4.0.13-1.dsc
  to pool/main/s/shadow/shadow_4.0.13-1.dsc
shadow_4.0.13.orig.tar.gz
  to pool/main/s/shadow/shadow_4.0.13.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 89902 at bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Perrier <bubulle at debian.org> (supplier of updated shadow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster at debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 10 Oct 2005 23:15:47 +0200
Source: shadow
Binary: login passwd
Architecture: source i386
Version: 1:4.0.13-1
Distribution: unstable
Urgency: low
Maintainer: Shadow package maintainers <pkg-shadow-devel at lists.alioth.debian.org>
Changed-By: Christian Perrier <bubulle at debian.org>
Description: 
 login      - system login tools
 passwd     - change and administer password and group data
Closes: 89902 115380 146779 208514 249372 265613 268656 269573 275343 282822 293171 300892 304343 304352 325558 325773 330630 330855 331487 331487 332711
Changes: 
 shadow (1:4.0.13-1) unstable; urgency=low
 .
   * The "Maroilles" release
   * New upstream version:
     Debian bugs fixed by the new upstream version:
     - faillog: Do not oversimplify the date of the last unsuccessful login
       Closes: #89902
     - login.1: also mention securetty(5). Closes: #325773
     - chfn.1, chsh.1, groupadd.8, newusers.8, pwconv.8
       useradd.8, userdel.8, usermod.8:
       Improved crossreferences with other manpages
       Closes: #300892
     - newgrp.1:
       Improved documentation of how group passwords work
       Closes: #325558
     - passwd.c:
       The usage line is no more too terse
       Closes: #146779
   * Patches to upstream man pages, not yet applied upstream:
     - debian/patches/452_doc_password_check_order:
       Document the order for checking the password strength
       Closes: #115380
   * Debian packaging fixes:
     - debian/login.su.pam:
       - pam_wheel example moved after pam_rootok in config.
         Also documents that with 'pam_wheel.so group=foo', root may need to
         be in the foo group. Closes: #330630, #330855
       - pam_env turned to be used as a session module which it is designed
         to be. Thanks to Steinar H. Gunderson who pointed this out and
         Steve Langasek and Andrew Suffield who suggested the right solution.
     - debian/control:
       - manpages-es-extra: versioned Replaces as the man pages have now been
                            removed
       - manpages-de:       versioned Replaces as the man pages have now been
                            removed
       - manpages-hu:       versioned Replaces as the man pages have now been
                            removed
     - debian/rules:
       - pack upstream's NEWS file into login and passwd. Closes: #331487
       - pack login.defs and its manpages into "passwd" instead of "login"
         package for the Hurd platform. Closes: #249372
       - copy upstream's changelog. Closes: #331487
     - debian/passwd.config, debian/passwd.templates:
       - allow preseeding the root (and user) password with a MD5 hash
         Closes: #275343, #304352
         Thanks to Colin Watson for the Ubuntu patch
       - the above also allows preseeding a disabled password for root
         Closes: #304343
       - add passwd/user-uid template, which can be preseeded to force the
         initial user to have a certain uid.
         Thanks to Colin Watson for the Ubuntu patch
       - allow hyphens in username
         Thanks to Colin Watson for the Ubuntu patch (Ubuntu #15721)
     - debian/login.defs:
       - document the obsoleted by PAM ENV_HZ variable. Closes: #265613
       - better document the real use of USERGROUPS_ENAB. Closes: #282822
     - debian/add-shell, debian/remove-shell, debian/add-shell.8,
       debian/remove-shell.8:
       - utilities moved to debianutils. Add a versioned "Depends" line on
         debianutils so that passwd cannot be upgraded when the new
         debianutils version including these utilities isn't available
         Closes: #208514, #268656, #269573, #293171
   * Debconf translation updates:
     - Swedish updated. Closes: #332711
Files: 
 261cbca719b22a396d2c38eab21e0f5b 867 admin required shadow_4.0.13-1.dsc
 034fab52e187e63cb52f153bb7f304c8 1622557 admin required shadow_4.0.13.orig.tar.gz
 3faf38ca58e4a594721f1068735ce920 181776 admin required shadow_4.0.13-1.diff.gz
 15e4ec0f57bdaf06bb3170d4de13867a 599276 admin required passwd_4.0.13-1_i386.deb
 087d22baecf6ef53ef8fb5e6d51564c1 560910 admin required login_4.0.13-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDTYDJ1OXtrMAUPS0RAvF5AJ49RdbhnKwV5mp6f+NY88B0/PzDyQCgpjoX
Jkjuz7tmFAhUmVxGJPtloRQ=
=9SLM
-----END PGP SIGNATURE-----




More information about the Pkg-shadow-devel mailing list